Pages

August 18, 2015

The largest DDoS attack of the quarter measured more than 240Gbps and lasted more than 13 hours, but the report said peak bandwidth is typically constrained to a one to two-hour window. ... That attack volume is capable of taking out tier 1 routers, such as those used by internet service providers (ISPs), the report said. DDoS attack activity set a new record in the quarter, up 132% compared with the same quarter in 2014 and up 7% on the previous quarter. Average peak attack bandwidth and volume increased slightly in the second quarter of 2015 compared with the previous quarter, but remained significantly lower than the peak averages observed in the second quarter of 2014, the report said.

At its core, object storage is a scalable and efficient means of combating the challenges associated with the massive amounts of unstructured data enterprises generate every day. It is a viable and fast-growing technology that enables simple deployment of massive data stores. With CTERA and HP Helion, organizations can overcome adoption challenges and transform object storage into a wide variety of managed file services that enable organizations to sync, serve, protect and govern file-based data like never before. We’re going to be talking a lot more about how CTERA can be deployed in conjunction with HP Helion.

In order to help Scrum Masters create their own approach we have collected many different views in the Scrum Master Toolbox podcast and have collected some of them here for you to read and refer to in the future. Below you will find a list of 15 tools and approaches that Scrum Masters all over the world use. Experienced Scrum Masters explain how they define and measure their own personal success as Scrum Masters, and share their lessons learned about how to achieve success. From how to deal with stakeholders, to how to improve your coaching skills, to how to help the team achieve a sustainable pace. The lessons shared below come from many years of experience and will help you improve your performance as a Scrum Master.

Keeping one step ahead of hackers is no easy task for IT security executives. There are so many ingenious hacker ploys, shady tricks and nefarious techniques to compromise your data, it might seem like no company could ever keep up. Cybercrime is clearly on the rise, and CIO have plenty of reasons to be anxious. Four recent high-profile hacks demonstrate that cybercriminals are breaching networks, stealing data and using social engineering to trick employees. We asked several security experts to weigh in on these cases, how they occurred and what CIOs should do to reduce the likelihood of a similar compromise. Hint: it’s more than just installing a new firewall and insisting that employees use antivirus apps.

The emergence of cybersecurity startups has continued unabated as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing and innovative attackers. The expertise of these new companies range from various improvements to encryption products to analyzing the wealth of security-incident data gathered from networks to gear that detects the potentially malicious wireless activity of Internet of Things devices. Based on the continued interest in these startups from venture capital investors, these companies will continue to proliferate. Here are 10 more security startups we are watching and why.

The mere creation of information does not enable its effective use, however, and so we are well-served to capture the stages between action in the world and improved action in the world. In completing a circuit of the Value Loop, from action back to modified action, information iscommunicated from its location of generation to where it can be processed—perhaps in the case of the tennis racquet, to your smartphone. Information is aggregated over time or space in order to create data sets that can be analyzed in ways that generate prescriptions for action. After all, data from a single tennis stroke do not provide nearly as much value as data over a one-hour practice session, or as much motivation as comparing your stroke with those of relevant peers.

Microsoft has provided plug-in replacements for Google Play and Google Maps. Interestingly, developers also need to swap Google Mobile Ads for the Microsoft Advertising (Ads in Apps) service. If the app uses the Google Cloud Messaging service, according to the leaked Microsoft documentation, developers will need to configure their app server to use the Windows Notification Service instead. But the tool does much more, according to reports on the web. Because Windows Phone has Android running in a Linux virtual machine, Android apps can be ‘side-loaded’ onto Windows Phones, enabling end users to run certain apps that do not use Google Play Services. This is similar to how BlackBerry BB10.3 devices can run Android apps without modification.

Vendors usually have good intentions, but they still have a natural bias toward their own products. That can mean they're unlikely to recommend a competitor's product (often because they're unfamiliar with other products). They may also genuinely feel their own solutions will solve all your problems. Well-meaning or not, vendors simply don't have an objective view of what's possible beyond their limited scope of performance. In the worst case, trusting a vendor can be like asking the fox to design and build a better hen-house. ... What happens if the system doesn't work at all? You spend even more money trying to solve your problems "In any new system, there's at least a bottleneck or two," Gentry says. "You can never right-size every aspect of a system based solely on theory."

Data show that corporate boards have a long way to go. Just 11% of public-company boards queried this year reported a high-level understanding of cybersecurity, the National Assn. of Corporate Directors said. A review by the New York Stock Exchange and security firm Veracode found that two-thirds of board members questioned think their companies are ill-prepared for a cyberattack. Yet consulting firm PricewaterhouseCoopers reports that 30% of boards surveyed never talk about cybersecurity at all. That fact raises eyebrows. "There's some liability in not taking every measure you can to protect your clients, to protect your revenue stream," said Gary Matus, managing director at the executive recruiting agency RSR Partners. "To give people confidence, you have to be getting the best advice you can."

It's a combination of value-added service and cost reduction that enterprise IT teams dream of. "What we're doing is actually improving service while at the same time reducing costs," says Haugabrook. "Our wireless project will provide students with more access, and Internet-based television is actually going to reduce our overall cable costs." ... Some of these data-driven decisions include transitioning to a 24-hour help desk to accommodate adult and online learners, as well as training overnight library staff to serve as IT support specialists for late-night queries. What's more, rather than hire full-time employees, VSU is hiring students part-time to function as help-desk technicians, enabling VSU to cut the overall IT budget by 5% this year while offering greater service, Haugabrook says.

Quote for the day:"Vision without execution is a daydream. Execution without vision is a nightmare." -- Japanese Proverb